![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Color Image Authentication through Visible Patterns (CAV)
In this paper a copyright protection technique based on visual patterns (CAV) has been proposed for color image. This technique manipulates bits of color image to hide the hash of secret without embedding secr...
-
Chapter and Conference Paper
Authentication in Higher Region of Convergence of Z Transform Domain (AHRocZ)
In this paper a novel technique for authentication has been proposed in composite real and imaginary components of Z transform domain in higher region of convergence
-
Chapter and Conference Paper
Image Authentication in Frequency Domain through G-Let Dihedral Group (IAFD-D3)
In this paper a G-Let based authentication technique has been proposed to authenticate digital documents by embedding a secret image/message inside the cover image in frequency domain. Cover image is transform...
-
Chapter and Conference Paper
KSOFM Network Based Neural Key Generation for Wireless Communication
In this paper a single layer perceptron (KSOFM Network) based neural key generation for encryption/decryption for wireless communication has been proposed. Identical KSOFM network has been used in both sender ...
-
Article
Open AccessVirtual-source imaging and repeatability for complex near surface
Based on seismic interferometry, the virtual source (VS) method is able to produce virtual gathers at buried receiver locations by crosscorrelating the direct-downgoing waves with corresponding reflected-upgoi...